> Hi,
> 
> we WGLCed this draft some time ago, but we are WGLCing it again at this
> point to make sure people are happy with the current version:
> 
> https://datatracker.ietf.org/doc/draft-ietf-hip-rfc4423-bis/
> 
> This WGLC will end on April 6th. Please, send your comments to this
> list before then.
> 

I read the revised version again today and believe it is ready to publish once 
the below nits are taken care of.  I believe that they are mostly editorial but 
I'd be happy to discuss on the list.

- Tom

Section 1
---------

Old text:

 There is exactly one Host Identifier for each Host Identity.

New text:

 There is exactly one Host Identifier for each Host Identity (although there 
may be transient periods of time such as key replacement when more than one 
identifier may be active).

The reference to Section 7 should be to Section 6.

The first use of ESP should be cited (it is later cited in 6.1).

Section 2
---------

Old text:

                                                            Public is  |
   |               | a relative term here, ranging from known to peers |
   |               | only to known to the World.                       |

New text:


                                                            Public is  |
   |               | a relative term here, ranging from "known to      |
   |               | peers only" to "known to the world."              |

Again, the reference to HIP base exchange should be Section 6, not Section 7

Section 3
-----------

Old text:

   o  The names should have a localized abstraction so that it can be
      used in existing protocols and APIs.

New text:

   o  The names should have a localized abstraction so that they can be
      used in existing protocols and APIs.

Section 4
---------

Old text:

   a public-key-based HI can
   authenticate the HIP packets and protect them for man-in-the-middle
   attacks.

New text:

   a public-key-based HI can
   authenticate the HIP packets and protect them from man-in-the-middle
   attacks.

s/HIP BEX/HIP base exchange

Section 4.2
-----------
s/through out/throughout

Section 4.3
-----------
s/HIts/HITs

Section 4.5
-----------
s/types of application/types of applications

Old text:

   For instance,
   Light-weight Directory Access Protocol (LDAP) or in a Public Key
   Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis].

New text:

   For instance, a directory based on the
   Lightweight Directory Access Protocol (LDAP) or a Public Key
   Infrastructure (PKI) [I-D.ietf-hip-rfc6253-bis] may be used.

s/associate with/associated with

s/a LDAP or DHT/an LDAP-based directory or DHT

Section 5
---------

Old text:

   As discussed above, the IP
   addresses can be seen to be a confounding of routing direction
   vectors and interface names.

New text:

   As discussed above, the IP
   addresses can be seen to be a confounding of computing platform
   names and interface names.

(or else delete this sentence as it is somewhat redundant with other sentences 
below; I just felt that the "confounding" aspect relates to EIDs and locators 
instead of routing direction vectors)

Section 8
---------
s/cannot distinguished/cannot be distinguished

Section 9
---------
s/intestigating/investigating

s/Particularly, so called bloom filters/In particular, so-called Bloom filters

(also in section 12.3, 'Bloom' is not capitalized; it should be either be 
capitalized everywhere (typical usage that I have seen) or lower case 
everywhere)

s/datastructures/data structures

s/by HIP working group/by the HIP working group

Section 10
----------
s/in a similar vain/similar to how

Old text:
   The implementations should provide for a policy of
   initiator HIT to responder HIT.

New text:
   The implementations should provide for a policy mapping of
   initiator HITs to responder HITs.

Section 11
----------
s/With the exception High-Performance/With the exception of High-Performance

s/As majority of the/As the majority of the

s/More agile IPv6 interoperability as discussed in Section 4.4./More agile IPv6 
interoperability can be achieved, as discussed in Section 4.4.

s/An addition, the underlying/Additionally, the underlying

s/halves the size of access control lists/can potentially halve the size of 
access control lists

the reference [scultz-intermittent] should probably be spelled 
[schuetz-intermittent]

Section 11.3
------------
s/accomodate/accommodate

s/strictly speaking mandatory/mandatory

Section 12.2
------------
s/credit-based authorization approach Host Mobility/credit-based authorization 
approach for host mobility

Section 12.3
-------------
s/There has been attempts/There have been attempts

s/the protection of malign data flows/??

s/which the the end-hosts/which the end-hosts

Section 15
----------
s/RFC 4424/RFC 4423

_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to